Jump to content

Recommended Posts

post-32477-1261866970.gif

Logs will be closed if you haven't replied within 3 days

Please don't attach the scans / logs for these tools, use "copy/paste".

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Please run a new MBAM scan being sure to update before scanning.

Post the scan results

Also please describe how your computer behaves at the moment.

Please don't attach the scans / logs, use "copy/paste".

Link to post
Share on other sites

When I try to go to an Internet page I get redirected to another one (advertising pages). Plus, after buying the PC a friend changed Windows 7 with XP: now, after almost 1 year, I have this message on my desktop: "This copy of Windows did not pass genuine Windows validation" and my desktop and PC is completely changed. Since I am not able to fix that another friend will try (again) to do it, but in January. Now I wanted at least to fix the virus/malware problem in order to be able to navigate.

Here you have the requested MBAM scan log:

Malwarebytes' Anti-Malware 1.51.2.1300

www.malwarebytes.org

Database version: 911122402

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

24/12/2011 12.54.01

mbam-log-2011-12-24 (12-53-57).txt

Scan type: Full scan (C:\|D:\|E:\|)

Objects scanned: 259731

Time elapsed: 38 minute(s), 13 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 7

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> No action taken.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> No action taken.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop (PUM.Hidden.Desktop) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Thanks a lot for helping me,

Alina

Link to post
Share on other sites

Please do not attach the scan results from Combofx. Use copy/paste.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

ComboFix 11-12-24.03 - alina 24/12/2011 18.43.18.1.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.39.1033.18.3039.2127 [GMT 1:00]

Eseguito da: c:\documents and settings\alina\Desktop\ComboFix.exe

AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}

AV: AVG Internet Security 2012 *Disabled/Updated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}

FW: AVG Firewall *Disabled* {8decf618-9569-4340-b34a-d78d28969b66}

.

.

((((((((((((((((((((((((((((((((((((( Altre eliminazioni )))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\documents and settings\Administrator\~AB8.tmp

c:\documents and settings\Administrator\Local Settings\Application Data\reg.exe

c:\documents and settings\alina\~AB8.tmp

c:\documents and settings\alina\Local Settings\Application Data\reg.exe

c:\documents and settings\alina\Start Menu\Internet Explorer.lnk

c:\documents and settings\All Users\Application Data\TEMP

c:\documents and settings\Default User\~AB8.tmp

c:\documents and settings\Default User\Local Settings\Application Data\reg.exe

c:\documents and settings\Guest\~AB8.tmp

c:\documents and settings\Guest\Local Settings\Application Data\Reg.exe

c:\windows\system32\config\systemprofile\~AB8.tmp

.

.

((((((((((((((((((((((((( Files Creati Da 2011-11-24 al 2011-12-24 )))))))))))))))))))))))))))))))))))

.

.

2011-12-24 17:14 . 2011-12-24 17:27 -------- d-----w- C:\32788R22FWJFW

2011-12-22 08:41 . 2011-12-22 08:42 -------- d-----w- c:\windows\1C7CC8E2CFCF41E6A8637C7A45CE8A78.TMP

2011-12-22 08:39 . 2011-12-22 08:39 -------- d-----w- c:\documents and settings\alina\Local Settings\Application Data\Threat Expert

2011-12-22 07:52 . 2011-12-22 09:14 -------- d-----w- c:\program files\PC Tools

2011-12-22 07:48 . 2011-11-22 18:42 185560 ----a-w- c:\windows\system32\drivers\PCTSD.sys

2011-12-22 07:48 . 2011-12-22 09:14 -------- d-----w- c:\program files\Common Files\PC Tools

2011-12-22 07:47 . 2011-12-22 08:41 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools

2011-12-22 07:47 . 2011-12-22 07:47 -------- d-----w- c:\documents and settings\alina\Application Data\TestApp

2011-12-21 23:23 . 2011-12-21 23:23 -------- d-----w- c:\documents and settings\Guest\Application Data\AVG2012

2011-12-21 22:57 . 2011-12-22 08:42 -------- d-----w- C:\sh4ldr

2011-12-21 22:57 . 2011-12-21 22:57 -------- d-----w- c:\program files\Enigma Software Group

2011-12-21 22:56 . 2011-12-21 22:56 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard

2011-12-21 21:45 . 2011-12-21 21:45 -------- d-----w- c:\documents and settings\alina\Application Data\AVG2012

2011-12-21 21:45 . 2011-12-21 21:45 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files

2011-12-21 21:44 . 2011-12-23 23:21 -------- d-----w- c:\windows\system32\drivers\AVG

2011-12-21 21:44 . 2011-12-21 21:56 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG2012

2011-12-21 21:43 . 2011-12-21 21:43 -------- d-----w- c:\program files\AVG

2011-12-21 21:41 . 2011-12-22 09:11 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData

2011-12-15 23:16 . 2009-06-30 09:37 28552 ----a-w- c:\windows\system32\drivers\pavboot.sys

2011-12-15 23:16 . 2011-12-15 23:16 -------- d-----w- c:\program files\Panda Security

2011-12-15 22:54 . 2011-12-15 22:55 -------- dc-h--w- c:\windows\ie8

2011-12-15 22:51 . 2011-08-16 10:45 6144 -c----w- c:\windows\system32\dllcache\iecompat.dll

2011-11-28 10:12 . 2011-11-28 10:12 -------- d-----w- c:\documents and settings\alina\Local Settings\Application Data\PCHealth

2011-11-27 10:15 . 2011-11-27 10:15 -------- d-----w- c:\windows\system32\XPSViewer

2011-11-27 10:15 . 2011-11-27 10:15 -------- d-----w- c:\program files\MSBuild

2011-11-27 10:14 . 2011-11-27 10:14 -------- d-----w- c:\program files\Reference Assemblies

2011-11-27 10:14 . 2008-07-06 12:06 89088 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\filterpipelineprintproc.dll

2011-11-27 10:14 . 2008-07-06 12:06 89088 -c----w- c:\windows\system32\dllcache\filterpipelineprintproc.dll

2011-11-27 10:14 . 2008-07-06 12:06 575488 -c----w- c:\windows\system32\dllcache\xpsshhdr.dll

2011-11-27 10:14 . 2008-07-06 12:06 575488 ------w- c:\windows\system32\xpsshhdr.dll

2011-11-27 10:14 . 2008-07-06 12:06 1676288 -c----w- c:\windows\system32\dllcache\xpssvcs.dll

2011-11-27 10:14 . 2008-07-06 12:06 1676288 ------w- c:\windows\system32\xpssvcs.dll

2011-11-27 10:14 . 2008-07-06 12:06 117760 ------w- c:\windows\system32\prntvpt.dll

2011-11-27 10:14 . 2008-07-06 10:50 597504 -c----w- c:\windows\system32\dllcache\printfilterpipelinesvc.exe

2011-11-27 10:14 . 2008-07-06 10:50 597504 ------w- c:\windows\system32\Spool\prtprocs\w32x86\printfilterpipelinesvc.exe

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-12-13 17:47 . 2011-06-09 08:54 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2011-11-28 21:21 . 2011-04-18 22:07 664 ----a-w- c:\documents and settings\Guest\Local Settings\Application Data\d3d9caps.tmp

2011-11-28 18:01 . 2011-10-01 17:01 41184 ----a-w- c:\windows\avastSS.scr

2011-11-28 18:01 . 2011-10-01 17:01 199816 ----a-w- c:\windows\system32\aswBoot.exe

2011-11-28 17:53 . 2011-10-01 17:01 435032 ----a-w- c:\windows\system32\drivers\aswSnx.sys

2011-11-28 17:53 . 2011-10-01 17:01 314456 ----a-w- c:\windows\system32\drivers\aswSP.sys

2011-11-28 17:52 . 2011-10-01 17:01 34392 ----a-w- c:\windows\system32\drivers\aswRdr.sys

2011-11-28 17:52 . 2011-10-01 17:01 52952 ----a-w- c:\windows\system32\drivers\aswTdi.sys

2011-11-28 17:52 . 2011-10-01 17:01 111320 ----a-w- c:\windows\system32\drivers\aswmon2.sys

2011-11-28 17:51 . 2011-10-01 17:01 105176 ----a-w- c:\windows\system32\drivers\aswmon.sys

2011-11-28 17:51 . 2011-10-01 17:01 20568 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys

2011-11-28 17:48 . 2011-10-01 17:01 30808 ----a-w- c:\windows\system32\drivers\aavmker4.sys

2011-11-23 13:25 . 2008-04-13 23:00 1859584 ----a-w- c:\windows\system32\win32k.sys

2011-11-10 04:54 . 2010-09-17 16:43 472808 ----a-w- c:\windows\system32\deployJava1.dll

2011-11-10 02:27 . 2010-05-16 09:23 73728 ----a-w- c:\windows\system32\javacpl.cpl

2011-11-04 19:20 . 2008-04-14 03:42 1469440 ------w- c:\windows\system32\inetcpl.cpl

2011-11-04 19:20 . 2008-04-14 03:42 916992 ----a-w- c:\windows\system32\wininet.dll

2011-11-04 19:20 . 2008-04-14 03:41 43520 ------w- c:\windows\system32\licmgr10.dll

2011-11-04 11:23 . 2008-04-13 22:07 385024 ------w- c:\windows\system32\html.iec

2011-11-01 16:07 . 2008-04-14 03:42 1288704 ----a-w- c:\windows\system32\ole32.dll

2011-10-28 05:31 . 2008-04-14 03:41 33280 ----a-w- c:\windows\system32\csrsrv.dll

2011-10-25 13:37 . 2008-04-13 22:54 2148864 ----a-w- c:\windows\system32\ntoskrnl.exe

2011-10-25 12:52 . 2008-04-14 00:01 2027008 ----a-w- c:\windows\system32\ntkrnlpa.exe

2011-10-18 11:13 . 2008-04-14 03:41 186880 ----a-w- c:\windows\system32\encdec.dll

2011-10-10 14:22 . 2010-05-16 09:19 692736 ----a-w- c:\windows\system32\inetcomm.dll

2011-10-07 05:23 . 2011-10-07 05:23 230608 ----a-w- c:\windows\system32\drivers\avgldx86.sys

2011-10-04 05:21 . 2011-10-04 05:21 16720 ----a-w- c:\windows\system32\drivers\AVGIDSShim.sys

2011-09-28 07:06 . 2008-04-14 03:41 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-09-26 10:41 . 2011-09-26 10:41 611328 ------w- c:\windows\system32\uiautomationcore.dll

2011-09-26 10:41 . 2004-09-01 07:00 220160 ----a-w- c:\windows\system32\oleacc.dll

2011-09-26 10:41 . 2004-09-01 07:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll

2011-11-21 04:35 . 2011-04-13 08:26 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

------- Sigcheck -------

Note: Unsigned files aren't necessarily malware.

.

[-] 2010-02-05 . F46B0A14F18667CCCFFE962B87558BF7 . 1430528 . . [6.00.2900.2180] . . c:\windows\explorer.exe

.

[-] 2010-02-05 . C951DB3D9B6EF3CF4B82454D30A8BF59 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((((((((((( Punti Reg Caricati ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Nota* i valori vuoti & legittimi/default non sono visualizzati.

REGEDIT4

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]

@="{472083B0-C522-11CF-8763-00608CC02F24}"

[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]

2011-11-28 18:01 122512 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Messenger (Yahoo!)"="c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe" [2010-04-29 5248312]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]

"WirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2010-03-23 500792]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-03-16 13671016]

"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2009-08-13 467036]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-09-07 37296]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]

"DivXUpdate"="c:\program files\DivX\DivX Update\DivXUpdate.exe" [2011-03-21 1230704]

"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2011-11-28 3744552]

"AVG_TRAY"="c:\program files\AVG\AVG2012\avgtray.exe" [2011-12-03 2415456]

"Malwarebytes' Anti-Malware"="c:\documents and settings\alina\Desktop\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-08-31 449608]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"_nltide_3"="advpack.dll" [2009-03-08 128512]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

RocketDock.lnk - c:\program files\RocketDock\RocketDock.exe [N/A]

.

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]

"NoSMMyPictures"= 1 (0x1)

"NoSMConfigurePrograms"= 1 (0x1)

.

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]

"NoSMMyPictures"= 1 (0x1)

"NoSMConfigurePrograms"= 1 (0x1)

.

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]

BootExecute REG_MULTI_SZ autocheck autochk *\0c:\progra~1\AVG\AVG2012\avgrsx.exe /sync /restart

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\AVG\\AVG2012\\avgnsx.exe"=

"c:\\Program Files\\AVG\\AVG2012\\avgdiagex.exe"=

"c:\\Program Files\\AVG\\AVG2012\\avgmfapx.exe"=

"c:\\Program Files\\AVG\\AVG2012\\avgemcx.exe"=

.

R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [11/07/2011 1.14.28 23120]

R0 Avgrkx86;AVG Anti-Rootkit Driver;c:\windows\system32\drivers\avgrkx86.sys [13/09/2011 6.30.10 32592]

R0 iastor86;iastor86;c:\windows\system32\drivers\iastor86.sys [11/02/2010 19.43.43 327192]

R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [16/12/2011 0.16.39 28552]

R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [01/10/2011 18.01.33 435032]

R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [01/10/2011 18.01.34 314456]

R1 Avgldx86;AVG AVI Loader Driver;c:\windows\system32\drivers\avgldx86.sys [07/10/2011 6.23.48 230608]

R1 Avgtdix;AVG TDI Driver;c:\windows\system32\drivers\avgtdix.sys [11/07/2011 1.14.38 295248]

R2 ASTRA32;ASTRA32 Kernel Driver 5.2.1.0;c:\program files\ASTRA32\astra32.sys [22/02/2007 10.28.48 30864]

R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [01/10/2011 18.01.34 20568]

R2 avgfws;AVG Firewall;c:\program files\AVG\AVG2012\avgfws.exe [23/11/2011 2.36.24 2391832]

R2 AVGIDSAgent;AVGIDSAgent;c:\program files\AVG\AVG2012\AVGIDSAgent.exe [12/10/2011 6.25.22 4433248]

R2 avgwd;AVG WatchDog;c:\program files\AVG\AVG2012\avgwdsvc.exe [02/08/2011 6.09.08 192776]

R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [25/05/2010 1.07.53 113664]

R3 Avgfwdx;Avgfwdx;c:\windows\system32\drivers\avgfwdx.sys [23/05/2011 1.03.20 30944]

R3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\drivers\AVGIDSDriver.sys [11/07/2011 1.14.26 134608]

R3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\drivers\AVGIDSFilter.sys [11/07/2011 1.14.28 24272]

R3 AVGIDSShim;AVGIDSShim;c:\windows\system32\drivers\AVGIDSShim.sys [04/10/2011 6.21.42 16720]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [25/05/2010 23.42.54 22216]

R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [11/03/2010 16.23.54 58600]

S2 MBAMService;MBAMService;c:\documents and settings\alina\Desktop\Malwarebytes' Anti-Malware\mbamservice.exe [24/12/2011 12.03.03 366152]

S3 Avgfwfd;AVG network filter service;c:\windows\system32\drivers\avgfwdx.sys [23/05/2011 1.03.20 30944]

S3 esgiguard;esgiguard;\??\c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys --> c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys [?]

S3 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]

.

.

------- Scansione supplementare -------

.

uStart Page = hxxp://www.google.it/

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000

TCP: DhcpNameServer = 192.168.1.1

FF - ProfilePath - c:\documents and settings\alina\Application Data\Mozilla\Firefox\Profiles\5gon5um2.default\

.

- - - - CHIAVI ORFANE RIMOSSE - - - -

.

HKLM-Run-nwiz - nwiz.exe

HKLM-Run-AESTFltr - c:\windows\system32\AESTFltr.exe

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-12-24 19:32

Windows 5.1.2600 Service Pack 3 NTFS

.

scansione processi nascosti ...

.

scansione entrate autostart nascoste ...

.

Scansione files nascosti ...

.

Scansione completata con successo

Files nascosti: 0

.

**************************************************************************

.

Ora fine scansione: 2011-12-24 19:51:10

ComboFix-quarantined-files.txt 2011-12-24 18:50

.

Pre-Run: 65.030.246.400 bytes free

Post-Run: 66.082.848.768 bytes free

.

WindowsXP-KB310994-SP2-Pro-BootDisk-ITA.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

.

- - End Of File - - 7D6780CACFAD404C3746D049F87A3684

Link to post
Share on other sites

Next:

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

Note: Close all browsers before running ATF Cleaner: IE, FireFox, etc.

Please download ATF Cleaner by Atribune.

Download - ATF Cleaner»

Double-click ATF-Cleaner.exe to run the program.

Under Main choose: Select All

Click the Empty Selected button.

  • If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.

If you use Opera browser

  • Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.

Click Exit on the Main menu to close the program.

It's normal after running ATF cleaner that the PC will be slower to boot the first time or two.

Next:

Note: Close all browsers before running ATF Cleaner: IE, FireFox, etc.

Please download GooredFix from one of the locations below and save it to your Desktop

Download Mirror #1

Download Mirror #2

  • Ensure all Firefox windows are closed.
  • To run the tool, double-click it (XP), or right-click and select Run As Administrator (Vista).
  • When prompted to run the scan, click Yes.
  • It doesn't take long to run, once it is finished move onto the next step

Next:

Download TDSSKiller from here and save it to your Desktop.

Note: if the Cure option is not there, please select 'Skip'.

Please read carefully and follow these steps.

  1. Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
    tdss_1.jpg
  2. Check the boxes beside Verify Driver Digital Signature and Detect TDLFS file system, then click OK.
    tdss_2.jpg
  3. Click the Start Scan button.
    tdss_3.jpg
  4. If a suspicious object is detected, the default action will be Skip, click on Continue.
    tdss_4.jpg
  5. If malicious objects are found, they will show in the Scan results and offer three (3) options.
  6. Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.
    tdss_5.jpg

A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste its contents on your next reply.

Link to post
Share on other sites

That's not a good sign

ZeroAccess/Max++ rootkit remover to remove ZeroAccess (Sirefef/MAX++) rootkit.

http://deletemalware.blogspot.com/2011/09/zeroaccesssirefefmax-rootkit-removal.html

1. Download the ZeroAccess/Max++ rootkit remover: http://anywhere.webrootcloudav.com/antizeroaccess.exe

2. Double-click on antizeroaccess icon to run it. It will ask you to verify that you want to perform a System scan. Type Y and press Enter.

antizeroaccess.jpg

Once finished, press Enter or any key to continue.

3. If your computer is infected with Zero Access rootkit, you'll see the following warning: Your system is infected!!

mrxsmb_sys.jpg

Infected file: mrxsmb.sys. In your case it might be different. Type Y and press Enter to perform system cleanup.

You should know see the notification that ZeroAccess rootkit has been successfully removed from the system. Press any key to exit the utility and restart your computer.

zeroaccess_cleaned.jpg

4. Run ZeroAccess/Max++ rootkit remover once again to confirm that ZeroAccess/Sirefef/MAX++ rootkit was successfully removed from your computer.

zeroaccess_not_found.jpg

5. Please run a new MBAM scan being sure to update before scanning.

Post the scan results

Also please describe how your computer behaves at the moment.

Please don't attach the scans / logs, use "copy/paste".

Link to post
Share on other sites

Farbar Service Scanner

Ran by alina (administrator) on 25-12-2011 at 02:09:00

Microsoft Windows XP Professional Service Pack 3 (X86)

****************************************************************

Internet Services:

============

Connection Status:

==============

Localhost is accessible.

LAN connected.

Google IP is accessible.

Yahoo IP is accessible.

File Check:

========

C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit

C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit

C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit

C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit

C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit

C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit

C:\WINDOWS\system32\svchost.exe => MD5 is legit

C:\WINDOWS\system32\rpcss.dll => MD5 is legit

C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:

=======

aswTdi(9) Gpc(6) IPSec(4) NetBT(5) PSched(7) Tcpip(3) WSIMD(8)

0x0B00000004000000010000000200000003000000090000000A0000000B00000005000000060000000700000008000000

**** End of log ****

Link to post
Share on other sites

Malwarebytes' Anti-Malware 1.51.2.1300

www.malwarebytes.org

Database version: 911122405

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

25/12/2011 2.20.54

mbam-log-2011-12-25 (02-20-54).txt

Scan type: Quick scan

Objects scanned: 185878

Time elapsed: 2 minute(s), 11 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

I want you to uninstall combofix and delete farbar's tool.

I'll leave your topic open for 3 more days so if the redirects come back, post here.

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week
    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.
    Without a firewall your computer is succeptible to being hacked and taken over.
    I am very serious about this and see it happen almost every day with my clients.
    Simply using a Firewall in its default configuration can lower your risk greatly.
  • Using a secure browser plugin M86 SecureBrowsing makes it safe to search, surf and socialize online. This free browser plug-in displays security icons next to links on search engines and social networking sites like Facebook, Twitter and LinkedIn, so you'll know which pages are safe and which ones to avoid.
    •Free browser plug-in for Internet Explorer and Firefox
    •Real-time safety ratings
    •Ideal for Facebook, Twitter and LinkedIn
  • JAVA Click this link and click on the Free JAVA Download
  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.
    This will ensure your computer has always the latest security updates available installed on your computer.
    If there are new updates to install, install them immediately, reboot your computer, and revisit the site
    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

The full version of Malwarebytes' Anti-Malware could have helped protect your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.